Job Overview :
This role is responsible for collecting and analyzing information from multiple sources to develop a deep understanding of cybersecurity threats and actors’ Tactics, Techniques, and Procedures (TTPs) . The incumbent derives and reports indicators that help organizations detect, predict, and prevent cyber incidents, safeguarding systems and networks from potential threats.
Professionals in this role are experts in threat detection, analysis, and response, utilizing AI-assisted tools and automated security workflows .
The role also involves proactively searching for undetected threats within networks and systems, identifying Indicators of Compromise (IOCs) , and recommending effective mitigation strategies. Additionally, the incumbent monitors, validates, and reports threat activities while ensuring continuous compliance with SAMA CSF, NIST, SAMA CTIP, and NCA-related controls .
Key Responsibilities :
- Monitor, collect, and analyze cyber threats using advanced threat intelligence platforms, AI-powered tools, and open-source intelligence.
- Develop, maintain, and refine threat intelligence frameworks , methodologies, and sharing platforms.
- Develop, maintain, and disseminate detailed threat intelligence reports, advisories, and briefings to stakeholders and leadership.
- Collaborate with SOC teams and cross-functional security teams to enhance incident response, threat mitigation, and overall security posture.
- Manage threat intelligence platforms, feeds, and partnerships, including ISACs or law enforcement collaborations.
- Maintain knowledge bases, threat libraries, and threat intelligence frameworks to support organizational awareness.
Required Skills / Technologies / Tools
Experience : 8 + years of hands-on experience in threat intelligence analysis , or a related role.Technical Expertise :Proficiency with SIEM platforms and threat intelligence tools (e.G., ThreatConnect, Recorded Future).Strong understanding of malware analysis , threat hunting , forensic analysis , and incident response .Solid grasp of cyber threats, vulnerabilities, and attack vectors across various environments.Familiarity with the MITRE ATT&CK framework and other cybersecurity models.Knowledge of cybersecurity frameworks and compliance standards (e.G., NIST, ISO 27001).Programming Skills : Experience with Python or similar scripting languages for automation and data analysis.Analytical Skills : Excellent research, analytical thinking, and problem-solving abilities to interpret complex threat data.Certifications : Industry-recognized certifications such as CTIA , GSEC , or equivalent are preferred.Good to have Technologies / Tools
Certifications : GCIH or CREST Threat Intelligence response certifications , or other relevant security credentials.